HackDig : Dig high-quality web security articles for hacker

With all the industry studies, articles and literature related to insider threats, it is baffling to see that very few have focused on how insider threats are acquired — in fact, paid for — during a merger and acquisition process. Organizations are so fixated on driving profits and staying competitive that they gobble up any tangible asset they can. Compani

“VeraCrypt is much safer after this audit, and the fixes applied to the software mean that the world is safer when using this software.”
The security researcher Jean-Baptiste Bédrune from Quarkslab and the cryptographer Marion Videau have discovered a number of security vulnerabilities in the popular encryption platform VeraCrypt. A new audit of

When we traditionally think of the benefits of ‘automation,’ we think of ‘improved quality and efficiency; and savings in time, cost and energy.’ One often overlooked benefit that can be achieved from this is the mitigation of risk and the enhanced security.According to a recent study by AlgoSec (State of Automation in Security, Sprin

Despite DHS components have strengthened coordination in performing their cyber missions a recent audit made by the OIG has found several security issues.
Among the missions assigned to the DHS there is the coordination of activities related to the prevention, mitigation and recovery from cyber incidents, the Department also o

Companies like mine, and consultants like me, have long been instructed and expected to pass on the mantra that the solution to security is compliance with standards and that being in compliance means you are secure.Having worked in the industry for more than a decade, I know that this is demonstrably not true. My hypothesis is that compliance and security n

The power and electric industry has one underlying mission: the reliable delivery of electricity. Many in the industry see audit requirements, such as the North American Electric Reliability Corporation’s (NERC) Critical Infrastructure Protection (CIP) Cyber Security Standards to be a major distraction from their core mission. Nevertheless, the industry is m

Before you freak out, allow me to clarify. It was one of several honeypots we have running. The honeypots are spread across the most commonly employed hosting companies. From Virtual Private Servers (VPS) to shared environments, to managed environments. In most instances we pay and configure them like any other consumer would so that we aren’t given an

IBM recently acquired CrossIdeas, adding to the IBM Security Systems division and its existing identity and access management (IAM) portfolio.
Prior to this acquisition, the company had already partnered with IBM in the Ready for IBM Security Intelligence program, and it integrated its identity and access governance solution platform with the IBM Security Id